Showing 38,361 - 38,380 results of 72,708 for search '"system"', query time: 0.26s Refine Results
  1. 38361

    Prevention of Leptospirosis Infected Vector and Human Population by Multiple Control Variables by Muhammad Altaf Khan, Saeed Islam, Sher Afzal Khan, Ilyas Khan, Sharidan Shafie, Taza Gul

    Published 2014-01-01
    “…We completely characterize the optimal control problem and compute the numerical solution of the optimality system using an iterative method.…”
    Get full text
    Article
  2. 38362

    SYNERGY BETWEEN THE YOUTH AND A SECURED NATION: AN ATTEMPT TO DEVELOP NIGERIA THROUGH POLITICS AND ELECTORAL REMINISCENCE by ABDULKAREEM ONAKOYA

    Published 2024-05-01
    “…Survey research method with the use of questionnaire to garner responses from various stakeholders and politicians was adopted by the researcher. System Theory was used to navigate the study with expected findings. …”
    Get full text
    Article
  3. 38363

    Recovery mechanism of large-scale damaged edge computing network in industrial Internet of things by Hui TIAN, Hao WU, Yang TIAN, Jianyang REN, Yajuan CUI, Wenbao AI, Jianhua YUAN

    Published 2021-04-01
    “…Given the limited resources at early stages for recovery, a failure recovery mechanism of the edge computing network considering both computational demands and repair costs was proposed, which intends to tackle the problem of the high probability of large-scale cascading failure caused by the interdependence between the edge computing network and other subnetworks in industrial Internet of things (IIoT).Considering the network structure (topology and link capacity) and network dynamics (computational demands), a joint link recovery selection and computation migration optimization problem was formulated under the conservation of node computing requirements.By leveraging the Benders decomposition algorithm, the NP-hard problem was transformed into a main problem and a sub-problem, which were interdependent and could be solved in polynomial time through the approximation of cutting planes.A local branching method was further introduced to guarantee the non-increasing nature of the Benders upper bound, thus accelerating the convergence of Benders decomposition.Simulation results demonstrate that the proposed algorithm outperforms the conventional topology-based recovery algorithm in system utility, and can perform well in multiple scenarios.…”
    Get full text
    Article
  4. 38364

    A Selection Model of Strategic Emerging Industries in Fujian Based on Entropy-VIKOR Algorithm by Qionge Zheng, Kunhui Chen, Deyi Kong, Jingxuan Liang, Jingjing Wu

    Published 2021-01-01
    “…In this paper, according to the characteristics of strategic emerging industries, drawing on the double helix model, this paper sets up an evaluation system for strategic emerging industries. Then, the entropy-VIKOR algorithm was introduced to evaluate and rank the backbone enterprises in Fujian, based on the data on 21 listed enterprises of strategic emerging industries in the province from 2017 to 2019. …”
    Get full text
    Article
  5. 38365

    Sharing talk, sharing cognition: philosophy with children as the basis for productive classroom interaction by Laura Kerslake, Sarah Rimmington

    Published 2017-02-01
    “…Taking the linguistic turn requires an examination of the relationship between thought and language: starting with Wittgenstein, we draw out the implications of expressing thought in a jointlyconstructed system of meaning. We then examine the relationship between thought and language in a pedagogical context by drawing on the practice of philosophy with children in the classroom, identifying key skills which are important in the development of meaningful classroom interaction, connecting this to philosophy with children practice. …”
    Get full text
    Article
  6. 38366

    Study on the Miscibility of Polypyrrole and Polyaniline Polymer Blends by Tekalign A. Tikish, Ashok Kumar, Jung Yong Kim

    Published 2018-01-01
    “…Characterization of the polymer blends was carried out based on the data analysis from Fourier transform infrared spectroscopy (FT-IR), X-ray diffraction (XRD), and differential scanning calorimetry (DSC). The PPy/PANI system was successfully formed blends in DMSO solvent. …”
    Get full text
    Article
  7. 38367

    A Novel End Effector for Telemanipulated Suturing in Robot-Assisted Laparoscopy by Kirst Alexander, Hellings-Kuß Anja, Hagmann Katharina, Dyck Michael, Schlenk Christopher, Klodmann Julian

    Published 2024-09-01
    “…The end effector is integrated into the DLR MiroSurge system to facilitate telemanipulated suturing. The mechanical properties of the end effector are characterized and its feasibility for use in robot-assisted laparoscopy is demonstrated.…”
    Get full text
    Article
  8. 38368

    A techno-economic study on the utilisation of airborne wind energy for reverse osmosis seawater desalination by Mahdi Ebrahimi Salari, Milad Zabihi, Jimmy Murphy

    Published 2025-01-01
    “…To understand the techno-economic feasibility of such a system, this research work studies a 2 MW airborne wind-driven reverse osmosis plant. …”
    Get full text
    Article
  9. 38369

    Current management of the stability of organizations of the investment and construction complex in crisis situations by A. V. Kozlovsky, N. A. Moiseenko, O. E. Astafyeva

    Published 2021-07-01
    “…In methodological terms, the authors propose to use a system of indicative analysis and regulation of production and economic activities of enterprises of the real sector of the economy, as an organizational tool for resolving crisis situations in the economy. …”
    Get full text
    Article
  10. 38370

    Problems of obtaining state support for a film creation project by Yu. V. Vorontsova

    Published 2023-07-01
    “…Problems in the current system of state support have been identified and recommendations for their solution provided. …”
    Get full text
    Article
  11. 38371

    Super algebra and Harmonic Oscillator in Anti de Sitter space by Omid Jalili, Shahin Toni

    Published 2019-04-01
    “…Finally we have obtained the various thermodynamics quantity of the system.…”
    Get full text
    Article
  12. 38372

    Calculation of RMS Current Load on DC-Link Capacitors for Multiphase Machine Drives under Carrier-Phase Shift Control by Zhigang Zhang, Pengcheng Zhang, Yang Zhang, Wenjuan Zhang, Mengdi Li, Zichen Xiong

    Published 2023-01-01
    “…In order to optimize the reliability and economy of the multiphase drive system, a Cotes method combined with carrier-phase shifting technology (CPST) for calculating RMS current of the dc-link capacitor is proposed. …”
    Get full text
    Article
  13. 38373

    Bulk Handling Facility Modeling and Simulation for Safeguards Analysis by Benjamin B. Cipiti, Nathan Shoman

    Published 2018-01-01
    “…These models are used for designing the overall safeguards system, examining new safeguards approaches, virtually testing new measurement instrumentation, and analyzing diversion scenarios. …”
    Get full text
    Article
  14. 38374

    Multi-function supported privacy protection data aggregation scheme for V2G network by Baiji HU, Xiaojuan ZHANG, Yuancheng LI, Rongxin LAI

    Published 2023-04-01
    “…In view of the problem that the functions of the current privacy protection data aggregation scheme were insufficient to meet the increasingly rich application requirements, a multi-function supported privacy protection data aggregation (MFPDA) scheme for V2G network was proposed.By using cryptographic algorithms such as BGN, BLS, and Shamir’s secret sharing, as well as fog computing and consortium blockchain technology, multiple security functions like fault tolerance, resistance to internal attacks, batch signature verification, no need for trusted third parties, and multiple aggregation functions were integrated into one privacy protection data aggregation scheme.Security analysis shows that the proposed scheme can protect data aggregation’s security, privacy and reliability.The performance evaluation shows that the introduction of fog computing can significantly reduce the computing overhead of the control center, and the reduction rate can be as high as 66.6%; the improvement of the consortium blockchain can effectively reduce the communication and storage overhead of the system, and the reduction rate can reach 16.7% and 24.9% respectively.…”
    Get full text
    Article
  15. 38375

    Big Data Analytics for Healthcare Industry: Impact, Applications, and Tools by Sunil Kumar, Maninder Singh

    Published 2019-03-01
    “…We also explore the conceptual architecture of big data analytics for healthcare which involves the data gathering history of different branches, the genome database, electronic health records, text/imagery, and clinical decisions support system.…”
    Get full text
    Article
  16. 38376

    FINANCIAL CONTROLLING STATUS AND POTENTIAL IN MEDIUM-SIZED ENTERPRISES OF TUZLA CANTON, BOSNIA AND HERZEGOVINA by Emira Kozarević, Amir Mujezinović

    Published 2020-11-01
    “…All the processes accompanying these activities are significantly faster and do not run in a classical way, which is why the management system nowadays requires that information requested within plan, analysis, and control run simultaneously. …”
    Get full text
    Article
  17. 38377

    Evolutionary Game Mechanism on Complex Networks of Green Agricultural Production under Intensive Management Pattern by Jianguo Du, Zhuoyun Zhou, Lingyan Xu

    Published 2020-01-01
    “…Detailed experimental results indicate that the double-score system under government guidance mechanism has a significant effect on the diffusion of the green agricultural production, of which the extra reward or penalty obtained from government is crucial. …”
    Get full text
    Article
  18. 38378

    Recent Advances in Methamphetamine Neurotoxicity Mechanisms and Its Molecular Pathophysiology by Shaobin Yu, Ling Zhu, Qiang Shen, Xue Bai, Xuhui Di

    Published 2015-01-01
    “…This review summarized the numerous interdependent mechanisms including excessive dopamine, ubiquitin-proteasome system dysfunction, protein nitration, endoplasmic reticulum stress, p53 expression, inflammatory molecular, D3 receptor, microtubule deacetylation, and HIV-1 Tat protein that have been demonstrated to contribute to this damage. …”
    Get full text
    Article
  19. 38379

    Study on Vehicle Load Model of Baijianhe Bridge by Zeying Yang, Yinglin Sun, Jianbo Qu, Chenghe Wang, Tianmin Wang

    Published 2022-01-01
    “…In order to calculate the vehicle load model of Baijianhe Bridge, based on the vehicle load data of the health monitoring system, the vehicle type, vehicle weight, wheelbase, and other information were counted and the data were processed and diagraphed to obtain the probability density distribution. …”
    Get full text
    Article
  20. 38380

    Certificateless ciphertext retrieval scheme with multi-user and multi-keyword based on cloud-edge collaboration by Xiaodong YANG, Tian TIAN, Jiaqi WANG, Meijuan LI, Caifen WANG

    Published 2022-05-01
    “…To solve the problems of single-user search, single-keyword search, high computational cost and low-security level of ciphertext data retrieval in the industrial Internet of things environment, a certificateless ciphertext retrieval scheme with multi-user and multi-keyword based on cloud-edge collaboration was proposed.A user access permissions table was set and once encryption algorithm was executed to realize multi-user search and update users’ access permissions.A cloud-side collaborative computing model was introduced to match keyword ciphertext and keyword trapdoor efficiently by a linear scanning method when the keyword ciphertext does not entirely contain the search keyword.Key escrow and certificate management problems were solved by utilizing certificateless encryption system.Keyword ciphertext authentication was ensured by using digital signature technology.The security analysis results show that the proposed scheme can resist internal keyword guessing attacks under the random oracle model.Simulation results show that the proposed scheme has higher computational efficiency compared with similar schemes.…”
    Get full text
    Article